Delegation Protocols founded on trust

被引:1
|
作者
Chandran, Rachil [1 ]
Hexmoor, Henry [2 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Southern Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
关键词
D O I
10.1109/KIMAS.2007.369831
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Delegations are the basic mechanism through which agents in a multiagent system coordinate. Delegations are also a major source of insecurity in a multiagent system. In this paper, we outline delegation protocols based on trust. Through these protocols, we address the problem associated with delegation decisions in a multiagent system.
引用
收藏
页码:328 / +
页数:2
相关论文
共 50 条
  • [1] Trust and delegation
    Brown, Stephen
    Goetzmann, William
    Liang, Bing
    Schwarz, Christopher
    JOURNAL OF FINANCIAL ECONOMICS, 2012, 103 (02) : 221 - 234
  • [2] Delegation fosters trust
    Dooley, D
    VETERINARY ECONOMICS, 1999, 40 (03): : 84 - 86
  • [3] Business in China is founded on trust
    Metsa-Serla News, 2000, (02):
  • [4] Delegation protocols for electronic commerce
    Crispo, B
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 674 - 679
  • [5] Trust and delegation: Theory and evidence
    Gur, Nurullah
    Bjornskov, Christian
    JOURNAL OF COMPARATIVE ECONOMICS, 2017, 45 (03) : 644 - 657
  • [6] Worker Trust in Management and Delegation in Organizations
    Meagher, Kieron J.
    Wait, Andrew
    JOURNAL OF LAW ECONOMICS & ORGANIZATION, 2020, 36 (03): : 495 - 536
  • [7] Leakiness is decidable for well-founded protocols
    Fröschle, Sibylle
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 176 - 195
  • [8] Delegation active certificates: Protocols and privilege management
    Bhoopalam, KP
    Mukkamala, R
    Peddi, PS
    International Conference on Computing, Communications and Control Technologies, Vol 1, Proceedings, 2004, : 57 - 62
  • [9] A new concept in protocols: Verifiable computational delegation
    Landrock, P
    SECURITY PROTOCOLS, 1999, 1550 : 137 - 153
  • [10] Delegation Protocols in Human-Centric Workflows
    Gaaloul, Khaled
    Proper, H. A.
    Charoy, Francois
    13TH IEEE INTERNATIONAL CONFERENCE ON COMMERCE AND ENTERPRISE COMPUTING (CEC 2011), 2011, : 219 - 224